I am writing a scientific paper on information security during online voting. I will provide you with paragraphs of text. Your task is to improve the writing and point out any inaccuracies if applicable. The first section is about Requirements for fair elections. ### FIRST PARAGRAPH ### % PARAGRAPH Requirements for fair physical voting and elections, how are they implemented? Before making the dive into web-based voting, let’s look at how elections work when they use physical ballots and what they require to be free and fair. We will consider these requirements as the base requirements for any voting system. First, citizens must be able to register to vote when they meet certain eligibility requirements and then cast their ballot without unnecessary burden or restrictions. Therefore, voters must have easy access to polling places and reasonable accommodations should be in place for citizens with disabilities or other health conditions. Additionally, elections must be conducted independently of government interference, counting votes should be reliably accurate and citizens should make informed choices through readily available, accurate and unbiased information.
The first part seems a bit archaic. Rewrite it to be formal but modern.
% PARAGRAPH Introduction of electronic voting (not web-based) For a while now, voters have not only been able to cast their vote using a paper ballot, but also using electronic voting systems. These systems are not without their flaws, as it has been shown that they lack verifiability properties. It is rather impossible to guarantee that the machines/systems have not been tampered with. (Veronique, Verifiability e-voting systems) % PARAGRAPH REVIEWING Translation into requirements for fair online voting Over the years, there has been an increasing interest in allowing the user to cast their vote remotely, using a web-based architecture that is safe to use (Estiona, Moscow, Democracy Live, iVote). This implies several extra requirements for voting. Generally speaking, there are five requirements for information security: data confidentiality, data integrity, availability, authenticity and auditability, the latter often called accountability or non-repudiation. Even though these requirements are used often and are well known in the data security community, it might be unclear how they should be interpreted in the context of online voting. We will discuss these special cases in a couple of paragraphs. (https://www.emerald.com/insight/content/doi/10.1108/09685220110366768/full/html)
Increase coherence between the first paragraph and the second.
I now have this: % PARAGRAPH Introduction of electronic voting (not web-based) Electronic voting systems have been introduced over the years as an alternative to traditional paper ballots, allowing voters to cast their votes using machines or digital platforms. These systems have faced criticism for lacking verifiability properties, making it difficult to ensure that the voting process has not been tampered with. The concerns surrounding the integrity of electronic voting systems underscore the need for robust security measures. % PARAGRAPH Translation into requirements for fair online voting More recently, there has been an increasing interest in online voting systems that are secure and trustworthy. Such systems allow the user to cast their vote remotely, using a web-based system. This shift towards online voting introduces several additional requirements for information security. In the data security community, five fundamental requirements are widely recognized: data confidentiality, data integrity, availability, authenticity, and auditability, also known as non-repudiation or accountability. While these requirements are well-established, their application in the context of online voting may require their own interpretation. We will delve into these special cases in the following paragraphs.
% PARAGRAPH Authentication and authorization To start simple, authentication are authorization are pretty general: the system should be able to verify the identity of the user (authentication) and if that user is elegible to vote (authorization). Because of these requirements, the system should be design so that adversaries are unable to simulate a legitimate voter during registration. Voters should also be prohibited of casting their vote multiple times, as each voter should only count for 1 vote.
% PARAGRAPH Integrity AKA Verifiability, cast as indented property In the general context of information security, data integrity or verifiability means that the message has not been modified between transmitting and receiving the data. However, in the context of web-based voting, this property also includes the guarantee that the final tally is correct. That means that each voter should be able to verify that their vote was counted, that all votes were counted in the final tally, and that only real votes were counted. This is often called the cast-as-intented property.
% PARAGRAPH Confidentiality AKA Vote secrecy and coercion resistance Voting systems should satisfy the confidentiality requirement. These systems might provide voter anonymity, in other words, the system never reveals what a voter voted for, both during submitting the vote and to the entity counting all the votes (when the voting period is over). However, in the context of remote voting, anonymity alone might be considered insufficient, as voting no longer happens in a secure and regulated environment, such as voting booths with official regulators nearby. Voters might be coerced into picking the choice of someone else. It is necessary to enable to voter to appear to comply with what is demanded of them by the coercer.
% PARAGRAPH Non-repudiation Non-repudiation generally means that the source of a piece of information cannot deny being the source of that information. This requirement is especially important in the context of voting, because the system should provide a way to trace back a cast vote to the original voter, otherwise votes might be generated, which breaks the requirement of being able to authenticate and authorize the voter.
Final paragraph of this section. It should be clear that the requirement of availability should be considered independently of the fact that this is a voting system. Existing techniques can be used. % PARAGRAPH Availability Finally, a voting system and the resulting tally should be highly available. However, our prototype will not consider this requirement, as this can be handled using existing techniques independently of the aspect that this is a voting system.
This is what I came up with: % PARAGRAPH Availability Finally, a reliable voting system must also prioritize availability. However, this requirement should be considered independently of the fact that this is a voting system, as existing techniques can be leveraged to achieve high availability. Our prototype will therefore not focus on this requirement.